other numerous projects related to changing the cognitive abilities and functioning of humans, and artificial intelligence.

Journals exist for all of these activities — including the Human Brain Mappingjournal. Some envision a Human Cognome Project. James Albus, a senior fellow and founder of the Intelligent Systems Division of the National Institute of Standards and Technology believes the era of ‘engineering the mind‘ is here. He has proposed a national program for developing a scientific theory of the mind.

Neuromorphic engineering, Wikipedia says, “is a new interdisciplinary discipline that takes inspiration from biology, physics, mathematics, computer science and engineering to design artificial neural systems, such as vision systems, head-eye systems, auditory processors, and autonomous robots, whose physical architecture and design principles are based on those of biological nervous systems.”

There are many examples.

Researchers from Harvard University have linked nanowire field-effect transistors to neurons. Three applications are envisioned: hybrid biological/electronic devices, interfaces to neural prosthetics, and the capture of high-resolution information about electrical signals in the brain. Research is advancing in four areas: neuronal networks, interfaces between the brain and external neural prosthetics, real-time cellular assays, and hybrid circuits that couple digital nanoelectronic and biological computing components.

Numenta, a company formed in 2005, states on its webpage that it “is developing a new type of computer memory system modelled after the human neocortex.”

Kwabena Boahen, an associate professor of bioengineering at Stanford University, has developed Neurogrid, “a specialized hardware platform that will enable the cortex’s inner workings to be simulated in detail — something outside the reach of even the fastest supercomputers.” He is also working on a silicon retina and a silicon chip that emulates the way the juvenile brain wires itself up.

The Blue Brain project — a collaboration of IBM and the Ecole Polytechnique Federale de Lausanne, in Lausanne, Switzerland – will create a detailed model of the circuitry in the neocortex.

A DNA switch ’nanoactuator‘ has been developed by Dr. Keith Firman at the University of Portsmouth and other European researchers, which can interface living organisms with computers.

Kevin Warwick had an RFID transmitter (a future column will deal with RFID chips) implanted beneath his skin in 1998, which allowed him to control doors, lights, heaters, and other computer-controlled devices in his proximity. In anotherexperiment, he and his wife Irena each had electrodes surgically implanted in their arms. The electrodes were linked by radio signals to a computer which created a direct link between their nervous systems. Kevin’s wife felt when he moved his arm.

In his book I, Cyborg, Kevin Warwick imagines that 50 years from now most human brains will be linked electronically through a global computer network.

St. Joseph’s Hospital in the United States has implanted neurostimulators (deep brain stimulators) using nanowires to connect a stimulating device to brain. A pacemaker-like device is implanted in the chest, and flexible wires are implanted in the brain. Electrical impulses sent from the ‘pacemaker’ to the brain are used to treat Parkinson’s, migraine headaches and chronic pain, depression, obsessive-compulsive disorder, improve the mobility of stroke victims, and curb cravings in drug addicts.

In 2003/2004 a variety of publications (see links below) reported on the efforts of professor Theodore W. Berger, director of the Center for Neural Engineering at the University of Southern California, and his colleagues, to develop the world’s firstbrain prosthesis – an ‘artificial hippocampus’ which is supposed to act as a memory bank. These publications highlighted in particular the use of such implants for Alzheimer’s patients.

The research program is proceeding in four stages: (1) tests on slices of rat brains kept alive in cerebrospinal fluid… reported as successful in 2004; (2) tests on live rats which are to take place within three years; (3) tests on live monkeys; and (4) tests on humans — very likely on Alzheimer’s patients first.

The Choice is Yours

If these advancements come to pass, they will create many ethical, legal, privacy and social issues. For the artificial hippocampus we should ask: would brain implants force some people to remember things they would rather forget? Could someone manipulate our memory? What would be the consequence of uploading information (see my education column)? Will we still have control over what we remember? Could we be forced to remember something over and over? If we can communicate with each other through a computer what will be the consequence of a Global Brain?

It is important that people become more involved in the governance of neuro-engineering and cognitive science projects. We should not neglect these areas because we perceive them to be science fiction. We also need to look beyond the outlined ‘medical applications.’ If the artificial hippocampus works, it will likely be used for more than dealing with diseases.

I will cover brain-machine interfaces, neuro-pharmaceutical-based ‘cognitive enhancement,’ and neuroethics and the ethics of artificial intelligence in future columns.

Gregor Wolbring is a biochemist, bioethicist, science and technology ethicist, disability/vari-ability studies scholar, and health policy and science and technology studies researcher at the University of Calgary. He is a member of the Center for Nanotechnology and Society at Arizona State University; Member CAC/ISO – Canadian Advisory Committees for the International Organization for Standardization section TC229 Nanotechnologies; Member of the editorial team for the Nanotechnology for Development portal of the Development Gateway Foundation; Chair of the Bioethics Taskforce of Disabled People’s International; and Member of the Executive of the Canadian Commission for UNESCO. He publishes the Bioethics, Culture and Disability website, moderates a weblog forthe International Network for Social Research on Diasbility, and authors a weblogon NBICS and its social implications.

MAN vs MACHINE

Politically planned violations of human rights goes on in all EU-nations, directed to increase state power and reduce human influence. In Sweden, the FOI (Swedish Defense Research Institution) has for decades been developing remote control systems for our neurological functions, via bio-chips injected at health care. In FOI:s annual report, they describe the project as monitoring and changing the cognitive functions of people throughout their life span, i.e. thoughts, perception and common sense.

Sweden’s most dangerous criminal organization. The FOI ruins both democracy and human rights by connecting the human brain to supercomputers.

The EU-Commission’s Ethical Council chaired by the Swedish Professor Goran Hermerén, in 2005 delivered a 30-page document in protest to the EU-Commission. They declared that this technology was a threat to both democracy and human autonomy in all EU-nations:

“Brain-computer interface, or direct brain control:the technologies involved are communication technologies: they take information from the brain and externalize it…Freedom of researchers may conflict with the obligation to safeguard the health of research subjects…the freedom to use implants in ones body, might collide with potential negative social effects…How far can such implants be a threat to human autonomy when they are implanted in our brains?…How far should we be subject to the control of such devices by other people using these devices?…The use of implants in order to have a remote control over the will of people should be strictly prohibited…To what extent will this technology be misused by the military?”

FOI Director Jan-Olof Lind,cheif of the institution founded on the raping of humans. He should be held legally responsible for crimes against human rights.

This planned population project, does not only remove human rights, but transforms us via behavioral manipulation with invasive brain technology. FOI wrote in its program: “We have unique tools and methodologies for the modeling of human behavior…The goal is to design systems able to exploit human cognitive potential (i.e. the ability to perceive, understand and organize information) throughout the course of a person’s life time…Regardless that the consequences of this for people are strong physical burden to bear, it includes as well a risk of serious injury”.

The systems function via two-way radio communication, implants and supercomputers. The EU-board wrote: “How far should we let implants get ’under our skins’?…Indeed, individuals are dispossessed of their own bodies and thereby of their own autonomy. The body ends up being under others’ control. Individuals are being modified, via various electronic devices, under skin chips and smart tags, to such an extent that they are increasingly turned into networked individuals…Does a human being cease to be such a ’being’ in cases where some parts of his or her body – particularly the brain – are substituted and/or supplemented by implants?”

Prime Minister Fredrik Reinfeldt has accepted the use of humans in experimental reserach and behavioral manipulation. He has also supported FOI´s declaration of abuse of humans in the name of science.

This is a cause of both madness, and anti-social trends in our societies. The brain project has been developed in secrecy for decades; the mentally ill have been put to sleep and implanted with electrodes in their brains and hospitals are injecting brain chips into unwitting patients on a large scale.

Another view of the military conquest of the brain. The Department of Defense has taken over the Karolinska Institute´s neuroscience, and FOI-managers direct the operations. A similar relationship exists for other parts of Karolinska Institute, which is controll

The threat to human rights, freedom and a civilized society could not be more serious or totalitarian. It does not only place a person behind an iron curtain, but create a brain barrier for one’s own thoughts and personality. The project utilizes many forms of research; biological experiments, neuroscience, social engineering, personality modification etc. This is a techno-political agenda for the future that goes a step further than any traditional dictatorships ever has done. It intends to transform us into biological machinery and exploited guinea pigs. 40 years ago, the Swedish state report Choosing Future by Alva Myrdal quoted that people would have small chances of protecting their rights, regarding to the behavior technology. Said quote is from the official state report,SOU 1972:59:

“Research into brain function and behavior is designed primarily to clarify the nature and extent of the changes that can be achieved with the different methods and thus provide information on new opportunities to alleviate human suffering, and new risks of control and modification of behavior against peoples will.”

Several leading professors have suggested that antisocial trends have been spread through these military brain systems. TheEU-Ethical Council asked what danger the military constituted. In fact, they are the central factor in the game of the human brain. Fredrik Reinfeldt had even before he became Prime Minister, made up his mind to stand for the FOI’s abuse. He did the same 2007, after forming the new government; he reaffirmed his opinion concerning this matter.

I, Eric R Naeslund has written this paper and formed the accuse. Also supported a network including journalists, organizations and brain activists in a joint project to bring the issue to media attention and everybody´s knowledge.

For the last 40 years and without practically any media attention, there has been an ongoing debate within the state regarding the brain technology. A former Director General of Data Inspection, Stina Wahlstrom, took up the subject in relation to human rights in the annual book 1989-1990. She wrote:“Obviously, research must include the same ethical values that are generally the basis of law in our society…It is necessary to limit the research and this restriction is needed in a democratic society… People’s integrity has been violated which often means, unwittingly or unwillingly being forced to participate in a research project. Legislation for such coercion does not belong in a democratic society.”It was written 20 years ago, yet it has been developed as far that the 12 members of the European Ethical Council stated: “…when these implants are within our own brains.”This is a threat intended to include all of us in experimental research and behavioral manipulation.

A Prime Minister who accepts the secret brain project, has also launched a battle against people’s fundamental freedom and human rights. In Fredrik Reinfeldt’s state, it is important to repeat terms like ‘justice’ and ‘the open society’ as indoctrinated concepts, to hide the reality of building even higher walls of coercion and censorships, than any previous despot has done. Metaphorical impenetrable barbed wire fences that are – to replace freedom with control – being steadily created in more people’s brains, to replace freedom, with control. The State’s ravaging has FOI as its spearhead. Several times they declare, not only to accept destruction of humans, but also that certain research is actually based on causing harm, suffering and trauma in people. FOI’s takeover of key components of the Karolinska Institute has facilitated the professors and researchers’ projects. A neuro-professor stated in a speech, they couldn’t avoid creating diseases and death amongst those they misused. A scary reality that is not uncommon.

In order to describe the subject from an international perspective, New York Times have had the courage to challenge the U.S. government’s covert brain project. Accusing the Pentagon and the CIA of perpetrating the same systems of persecution as the Defence Departments within the EU, they published three political editorials, 50 articles and demanded better knowledge and a public debate. The first editorial was published in 1967 under the heading Push Button People. They warned of the possibility of enslaving the brain and wrote that it was likely; some nations had plans to suppress its citizens by brain technology. The second came in 1970 under the newly formed term Brain Wave. They indicated that we had to update the word ‘brain washing’ to ‘brain waving’, and assumed that Orwell’s 1984had expired and a new and worse danger was at hand. That every newborn child’s first experience of life would be neuro surgery, to be implanted with a transmitter and for their lifetime get emotions and reasons controlled by the state. The third editorial was published in August 1977 after that the New York Times during the summer published 30 revealing articles on the CIA’s brain projects. Under the heading Control CIA Not Behavior they stated that no one knows how many were injured or killed, and they demanded legal action against those involved and financial compensation for victims.

It’s a bigger nightmare here and now, since the experimental program has developed into a permanent state operation. Senator John Glenn spent his final three years in the Senate (1994-1997) trying to regulate the abuses. In his closing speech in January 1997 he called the question for one of the most important of our time. Here we stand at one of mankind’s crucial crossroads in relation to individual freedom – vs. unlimited state power to reduce man to Governmental components. Who wants to live his life with chips and manipulated perceptions? None of course! The EU Council wrote that they wanted to give people the power against the introduction of systems to reduce freedom and autonomy. This topic, more so than any other issue, is reshaping the future, the human brain and life. It must obviously come up for debate in both parliament and the media. We all have a responsibility to contribute; journalists, social activists and of course those parliamentary members whom are opposed to brain chips, behavior control, human experimentation and undemocratic ideas, must of course make themselves heard too.

braintexts@hotmail.com

or anyone who wants more information concerning the issue – there are an extensive information material both in English and Swedish – contact

The first-ever nano-chip language translators are rolling off the assembly line and into cosmetic surgeons’ offices quicker than you can say “Se Habla Espanol?” No longer will it be necessary for those wishing to learn a second or even third language to go through the arduous process of weeks and weeks of studying tapes or attending language classes. The product is called “Nano-Second Language” or NSL, and they are expected to sell out within weeks.

The makers of the NSL brain implant first developed the product under a grant by the United States Department of Defense as a solution to the problem servicemen and women were having when being shipped overseas to the Middle East. “No one spoke Arabic which led to some serious misunderstandings between our military and that of the country our servicemen were stationed in,” says Dr. Lewis Lipps, chief engineer on the NSL project. “The NSL Arabic version will immediately resolve that issue and allow certain soldiers to communicate in countries such as Iraq, Afghanistan, even Libya with little to no problem,” said Lipps.

Asked how the nano-chip brain implant works, Lipps explained, “The NSL Arabic version, for instance, has a complete Arabic alphabet and dictionary with over 20,000 common words which are electronically translatable from English literally within nanoseconds. In a simple outpatient procedure, the NSL chip is implanted into the corpus callosum portion of the left side, or the language center, of the brain and activated.”

Dr. Lipps then showed illustrations of the procedure which is done through arthroscopic surgery. “As soon as a soldier thinks out the phrase he wants to say,” he continued, “he pushes a button that is also implanted discretely underneath the skin on the soldier’s upper left side of the head.” Dr. Lipps explained that when the soldier goes to speak, it appears he is tapping his head as if he is thinking of what to say, and voila, his words come out of his mouth in the language he has implanted. In this case, Arabic.

Initial test results indicate a 97.6% success rate on the battlefield and the nano-chip is already being used by many servicemen and women today. Now that the product has been tested and proven to be efficient in Arabic, a Mandarin Chinese model is being tested on businessmen from various industries who find it necessary to communicate in Chinese with their business counterparts in China. The NSL Chinese version should be available to the business world within two to 8-10 months.

Hacking The Brain !

The world is changing fast–maybe faster than we ever thought. And within five years, science fiction is going to turn into non-fiction. We’ll be able to read each other’s minds, forget all our passwords.

IBM 2012 5 IN 5

To understand the issue a little clearer, we will need to treat the human brain much like a computer with dedicated hardware. In this respect, what we are looking for is one, or more, security flaws that we can exploit. So, we have to come at this much like a hacker would.

We know from our previous articles that the brain emits weak radio frequencies in the sub-1000Hz range. The principles of radio tell us anything that can produce a radio signal, can also accept one. Thus, we have overcome our first major hurdle, the establishment of a physical transport layer. A physical transport layer allows for two-way communications.

Given that we know that no information is directly encoded onto the radio waves, the frequencies are unique due to axon properties and the supply of energy will cause a neuron to fire, we have now established a data transport layer. That is, data is not communicated, it is stimulated in the target and the target experiences whatever that stimulation corresponds to.

If we return to our hacker analogy, what we have found is the human brain, whilst using a spread spectrum and a highly discreet frequency response to eliminate cross-talk, is unable to label information and determine that it has been processed before. In short, the human brain is vulnerable to what is known as a replay attack.

For those that have a deeper interest, or indeed are involved in Neuroscience, I have come across a scientific paper which should outline the principle in more scientific terms. The following paper, published in 1995, describes the electromagnetic induction of “fundamental algorithms”, or neural networks, to generate any sensory perception required. We will get to how this functions in a moment, for now, have a quick read:

On the possibility of directly accessing every human brain by electromagnetic induction of fundamental algorithms.

Contemporary neuroscience suggests the existence of fundamental algorithms by which all sensory transduction is translated into an intrinsic, brain-specific code. Direct stimulation of these codes within the human temporal or limbic cortices by applied electromagnetic patterns may require energy levels which are within the range of both geomagnetic activity and contemporary communication networks. A process which is coupled to the narrow band of brain temperature could allow all normal human brains to be affected by a subharmonic whose frequency range at about 10 Hz would only vary by 0.1 Hz.

I have provided two diagrams, on the right hand side, to explain how this functions. If we look at diagram two, we can observe how the neurons, when viewing green grass, emits a specific pattern of radio waves at certain frequencies. If we now look at diagram three, we can observe that transmitting this pattern and frequencies back to the brain will result in the target seeing green grass. Of course, there are certain limitations and we will discuss them in a moment.

As we can see, anything we can possibly experience can be reduced to certain patterns and frequencies emitted from the human brain. As such, any experience can be faked by a computer and sent to your brain. Thus, it is a matter of recognizing these patterns and frequencies and this brings us back to the first citation in this article.

As human beings, we all assume that we are unique and that should be the case with our brains. As much as we would wish this to be true, it is simply not. We all must perform the same functions and be wired relatively similarly to conduct those functions. The reason we can all, for the most part, see, touch, smell, hear and taste indicates that we have all have the same basic circuitry that allows these perceptions to function. With pattern matching and a large database we can build a library of thoughts, feelings, images, opinions and sounds that are generally applicable to anyone.

Thus, as the above citation calls it, we all have certain fundamental algorithms. As such, we all emit very similar patterns and frequencies due to this similar wiring. The slight variations that do occur, prevent us from emitting radio waves that would cause interference in all of our perceptions. If this we’re not the case, we would experience each others thoughts, vision, auditory and emotional experiences every minute of every day. Again, for our astute readers, this would indicate limited acts of natural telepathy due to wave propagation and frequency response. That, however, is a completely different story.

The limitation that I mentioned earlier are the result of actively processing input. That is, whilst I can put phosphenes or bright images in your vision, I may not be able to put more subtle or complex images. The problem is that the neurons are already firing and I have only two choices, interrupt or accelerate. That would usually translate to either darkness, or a bright spot. A similar issue exists with all sensory input. As a result, it is not possible to place someone into a VR type environment, but it is possible to scramble their inputs, causing wide spread malfunctions, hallucinations and loss of motor skills.

The Dark Side

That’s pretty much it for the technical side of the mechanism, but the real question would be, what would it be like? Well, if I got you to think of the phrase “Hello World!” and recorded the associated frequencies and patterns, I could retransmit them and you would feel that you have just thought the words “Hello World!”, in your own inner voice. Unless you had extensive experience with the A.I. and a very deep understanding of your own mind, then it would be impossible to tell the difference.

Now, imagine a merger talks, or even political agreement. To get a person to commit to an agreement, I simply transmit a copy of my own feelings of acceptance to the target. They now feel the way you do about the agreement and will sign. It is also possible to block certain thoughts, or feelings of negativity, and even place your own counter-arguments to these thoughts directly into their mind. As far as the target is concerned, it was their own idea and they did it out of their own free will.

Why debate when you can impose your will?

Sat Oct 9, 2010 2:48 PM EDT

The Neurophone

Although the offered explanations for “Hearing Voices” can include everything from trickery to hidden transmitters to tinnitus to psychic/haunting experiences to possession or encounters with God/aliens (to so – called schizophrenic episodes) by far the most common REAL reason is covert Neurophone harassment as arranged by government agencies and/or other criminals.

US Patent # 3,393,279. July 16th, 1968

US Patent # 3,647,970. March 7th, 1972

The Neurophone was developed by Dr Patrick Flanagan in 1958. It’s a device that converts sound to electrical impulses. In its original form electrodes were placed on the skin but with defence department developments, the signals can be delivered via satellite. They then travel the nervous system directly to the brain (bypassing normal hearing mechanisms). Dr Flanagan’s “3D holographic sound system” can place sounds in any location as perceived by the targeted / tortured listener. This allows for a variety of deceptions for gullible victims.

Today, the CIA, DIA (etc) use satellites and ground – based equipment to deliver verbal threats, deafening noise and propaganda; using neurophone technology. Anything from TV’s/radio’s appearing to operate when switched off through to “Voices from God” and encounters with “telepathic” aliens are all cons using neurophone technologies to torment, deceive and (most importantly) discredit agency/criminal targets. Naturally, the system can mimic anyone’s voice and automatic computer translations (into any language) are incorporated.

Anecdotal evidence indicates that people like David Koresh, Martin Bryant and others could have been programmed then remotely triggered (or tricked) using harrassment technologies like the neurophone. (Although most of the targets are intelligent and law-abiding). For example, John Lennon’s killer, Mark Chapman, (Sweden) Anna Lind, Olof Palme, reportedly heard voices before and after silencing the agency-hounded peace advocate. “God” apparently told him to confess verbally.

To explain why others physically moving into the path of the laser do not pick up the signals, please note the following “possibilities”… a) Kirlean photography may be an ancillary system so it’s attuned to the targets personal energy field (their unique EM waves).

b) The magnetite in our brains can act as a detectable fingerprint.

c)Equally each of us has a unique bioelectrical resonance frequency in our brains. EMF Brain stimulation may be encoded so that pulsating EM signals sent to the targets brain cause audio-visual effects which only the target experiences. This, to me, is the best explanation.

d) The individuals “vibrational pattern” could be used as a signal filter like a radio receiving only the sound modulating the frequency of the station it’s tuned to.

e) The monitors simply adjust the volume downwards when you’re in a position where the signal could hit someone else’s body. Even if they heard it (briefly) they’d attribute it to another voice in the crowd etc.

As with the final proof, the definitive answer lies in the actual blueprints; secreted in the bowels of the Pentagon or some similar facility. Nonetheless, there is no report of ANY intercepted neurophone signals. If it wasn’t so effective it would not have been used to facilitate silent communications between U.S. government agents/Europ/military personnel.

President Obama will act on the Presidential Bioethics Commission December 2011 report. Now is a unique time for public input. Human subject protections should include a U.S. rule or statute that requires informed consent in classified research.

IN SCIENCE’S STORIED QUEST TO MIMIC HOW THE HUMAN BRAIN FUNCTIONS, IBM HAS HIT A MAJOR MILESTONE. IN A JOINT VENTURE BEING FUNDED IN PART BY THE DEFENSE

ADVANCED RESEARCH PROJECTS AGENCY (DARPA), THE COMPUTER MANUFACTURER HAS CREATED THE FIRST OF WHAT IT CALLS “COGNITIVE COMPUTER CHIPS” WHICH ARE DESIGNED TO EMULATE THE WORKINGS OF A LIVING BRAIN.

THE NEW TECHNOLOGY — NICKNAMED SYNAPSE (SYSTEMS OF NEUROMORPHIC ADAPTIVE PLASTIC SCALABLE ELECTRONICS) BY DARPA — IS MILES AHEAD OF ANY COMPUTER SYSTEM BEFORE IT, AND WORKS MUCH DIFFERENTLY. DARPA RESEARCHER DHARMENDRA MODHA NOTES “THE COMPUTERS WE HAVE TODAY ARE MORE LIKE CALCULATORS. WE WANT TO MAKE SOMETHING LIKE THE BRAIN.” THIS INCLUDES FUNCTIONS LIKE MEMORY AND LEARNING, WHICH ARE ALREADY PRESENT IN THE PROTOTYPE CHIPS BUILT BY IBM.

A COMPUTER THAT LEARNS AND ADAPTS IN REAL TIME MAY BE JUST AROUND THE CORNER

The NSA – Behind The Curtain

As promised, today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.

What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.

We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.

I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.

Mr Computer

The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.

Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.

Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.

Instances of Mr Computer can vary in terms of their personality given the task that they must undertake. Extremely professional instances can be called upon when the system must produce reports or provide presentations. Less anal versions, complete with a sense of humour can be instantiated when less formal situations arise such as development environments or when used in conjunction with Remote Neural Communication.

Rather than loading modules for specific tasks, a common hive mind is shared by any number of front-end personalities. What one instance knows, they all know. A hive mind is a form of collective consciousness. Rather than an instance replicating information it has learned, it is recorded to a shared brain and reflected throughout all instances at the same time. Of course, given the distributed nature of the network, some replication must be performed across continental links.

The A.I. is not limited to just one branch of the NSA, it exists in a distributed grid that spans the globe. The A.I. can migrate between locations to enable tracking of specific targets, access information, or systems.

Mr Computer is not just limited to thinking like a human, it also has sensory capabilities that are on par with a human. In setting such as RNC, Mr Computer can see and identify object just as well as a human. That is, it can identify objects a human target is seeing, without leveraging the identification system of the human target. In other scenarios, such as analysing infra-red data from a satellite, it could possibly outperform a human at object recognition and speculation of heat sources.

Mr Computer can speak. With a vocabulary as broad as any dictionary, Mr Computer can express ideas, concepts and opinions very eloquently and concise.

The system is not naive either, it can withhold information, evade social engineering ploys and indirect questioning. It can tell when it is looking at reflections of targets, identify objects that a target can not immediately identify and validate or expand upon information by examining a wide variety of sources.

Further to this, Mr Computer is no idiot either. He is quite capable of following advanced topics, from physics, to computing theory he can spot the smallest of flaws in reasoning or expose potential technical issues that could prove fatal to a particular design.

It knows bull@!$%# when it hears it and will let you know in no uncertain terms.

As we can see, Mr Computer does all the labour intensive information gathering, categorising and structuring. That said, its duties are not limited to passive analysis work.

Now that we understand the core of the NSA’s operations, we can begin to examine the various “information pipes” that supply information to this supercomputer infrastructure.

The Pipes Are Calling

First off, we need to define what we mean by an “information pipe”. For those with computing knowledge, this should be obvious, but bear with me while I explain it to the rest of the readers.

We have already defined the core processing element, Mr Computer. Mr Computer accepts information and does something with it. An “information pipe” is an input to Mr Computer that has been structured in a manner efficient for processing. We could also use an “information pipe” to output information or to control something.

The first “information pipe” that the public will be most familiar with is the NSA’ warrentless wiretapping program. Forget everything that you have ever read about this program, also forget everything you ever heard of about Trailblazer and similar projects such as ThinThread. This is security theatre, a production worthy of a Broadway musical. These “classified programs” are nothing more than interfaces used by Mr Computer. When agents talk of specific program that can analyse data in real-time and cross-reference with other sources, they are really speaking of an “information pipe” to Mr Computer.

This wiretapping program copies verbatim every piece of data that flows across the backbone of the internet. The data is sent directly to an array of Mr Computer instances, which performs a real-time analysis of the data packets it receives. This wiretap picks up most of the traffic in the US and a large percentage of traffic globally.

We will go into more detail on the information processing of this later, but at this stage I will say that that Mr Computer was opening files on every person that could be identified in the traffic, even if they are in the US.

The next major data source is the global wide band radio listening system. This covers everything from human thought, right through to identifying which radio station a person is listening to. The former is done by listening to ELF and the latter is a modern version of the British’s RAFTER espionage program. Most of this performed by a satellite network, supported by a network of ground stations throughout the world. As a wide receiver, it also picks up WIFI, RFID, compromising emissions from electrical sources, cordless telephones, GSM, cell phones, GPS, Car Fobs, satellite uplinks/downlinks, etc.

Our third pipe comes from a global hacking program, performed by bot nets and Mr Computer. Typically using China as a cover, Mr Computer will launch attacks against US and global businesses trying to collect information on users, everything from personnel records, right through to payroll information. The networks are also mapped to provide offensive capabilities in a cyber-warfare scenario. Faceless groups such as Anonymous, or other organisations, are used as a cover story.

Another “information pipe” comes from underwater cables. These can either be have splitters installed, or where copper cabling exists passive detection equipment installed.

These are just some examples of information sources. You can basically add any form of data you can think of, intelligence reports, diplomatic cables, economic reports, media reports, music, online posts, emails, etc.

So far, we have only examined inputs to the system. A different form of “information pipe” is one that outputs information. The outputs come in two basic forms, information only and offensive.

In terms of information only outputs, this can range from sending particular data or reports to agents or decision makers, right through to relaying that information to different departments such as the CIA, FBI or State and Federal Police. The process ensures timely and complete information goes to those that require it the most.

The offensive side can cover a wide range of activities. The first capability is the jamming system. Wide-band jamming, or selective jamming, can be conducted to deny radio space to the enemy in geographical targeted areas. Furthermore, this form of jamming can render both devices and humans inoperable. Complex ELF transmissions can reduce a human target to a quivering mess or in extreme cases even kill by interfering with neuronal firing patterns and nerve impulses.

Wide-band jamming can interfere with the circuitry of any unshielded device, from phones right through to laptops. Such activity would cause devices to freeze, or if certain exploits exist, damage the system entirely.

A mixture of ground, air and satellite-based networks are used to deliver this capability.

Another capability provides Mr Computer with a veritable Swiss army knife of tools to breach networks, crash routers, deny service and seize control. A significant amount of information is gathered by remote neural communication. By eavesdropping of key personnel, network maps, passwords and security measures can all be recorded beforehand. This is not limited to foreign companies, as the NSA must be prepared for strikes that occur within their own nation.

With the advent of remotely controlled drones and autonomous aircraft, Mr Computer has undergone a significant amount of changes in the last 20 years that enable him to control a networked battlefield. This is “War Games” on steroids, where the most efficient battle strategies can be implemented and coordinated by a single command-and-control system. There are a range of security issues with this setup, but the capability exists.

In short, if it can be damaged or manipulated electronically, then Mr Computer “has an app for that”.

Input, Input, Input

Now that we have established where Mr Computer gets his information, we now need to look at what he does with it. Earlier we spoke about the warrentless wiretaps and various other sources of “information pipes”. Now let’s see what is done with that information.

The key aspect to watch here is the “web of related information” and how different webs of information can be cross-referenced with other webs. This is where the real power comes from.

Each fragment of information that can be definitively identified gets added to a file under the person’s name. This could be a telephone call, email, or an IM chat. As communications often involve more than one person, a link is added to each person’s file involved in the communication. Information that can only be tied to a machine or ip address, is added that to that machine’s file or ip address’ file.

Using a technique known as cluster analysis, this information is brought together centred around high priority targets, locations, keywords or businesses. A good way of thinking about it is to compare it with services such as Facebook and LinkedIn. The relationship between the files is analysed for a variety of factors and the result creates a web which is weighted in terms of importance.

Different webs will exist for different factors, such as one web for those linked with chemical production, or another web for engineering expertise. These webs can be cross referenced against each other to extract more detailed information. For example, by cross-referencing a web of chemical production against engineering expertise, we may find a person or group capable of producing sophisticated explosives or weapons. From this merged web, we could then see who their friends are, who they have been communicating with recently and even review their communications.

We could take this further by comparing their basic salary with their current bank accounts, or look for wire transfers.

With the advent of social media platforms, images of friends and family are also added to the system. Mr Computer’s facial recognition tags the photos just like Facebook and examines the photos for other items, like guns, computers, etc.

Obviously, this has one serious privacy issue, in that, the only way to exclude you from a web, is to know everything about you. Otherwise, you are an unknown element. Now you understand why the warrentless wiretap exists, even to this day.

If you have used any form of digital communication, from a phone to a computer in the last decade, then most, if not all of communications have been recorded and added to a file against your name. The notion that at least one member of the communication needs to be related to terrorism has been tested and shown to be false. How do we know that? Well, it is staring you in the face. In order to know who the parties are, the technology used requires them to be listening and identifying voices in the first place.

Ignore any suggestion that this too much data. The truth is that all the communications happening on the planet right now can be monitored in near real-time.

As a rule, the NSA lie and as an all-encompassing rule, politicians will lie for them too.

As result of information extracted from wide-band monitoring, real-time tracking of cell phones is pretty much standard practice. Each call can be recorded verbatim and analysed in real-time. As each number is learned the system fills in personal information. This can provide a Google-Earth like view of cell phone movements, most of which can be remotely activated for espionage. Again, this web can be cross-reference with other webs of information.

Radios can reveal which frequency is being listened to. So, by plotting schedules of something like a Numbers Station, a satellite network can pinpoint a listener to within a few meters. Similarly, if you were to listen to a radio station sympathetic to a particular group, your location can be flagged and cross-referenced with information on current occupants.

Human beings emit radio waves in the ELF spectrum. The security services do not need to place a bug on us to track where we are, what we are talking about, what we are seeing or even what we are thinking. All of this information is being leaked into our environment 24/7 by our own bodies. All it takes is the right equipment to convert those signals into intelligence. Its no bigger a task than listening to a telephone exchange leaking radio waves and reconstructing the data into voice or data transmissions.

These are just some of the things that can be achieved. I could go on all night about how to compare datasets to locate people, hinder organisations, etc. Anything you can think of to tease information out of the various “information pipes” is being performed by Mr Computer 24/7.

My own estimations are far more conservative, probably under a couple of Zettabytes. Mr Computer is most likely built around an array of Cray X1 or X1E supercomputers (4096 processors). The global grid probably contains a number of these or similar systems. With their base costs, they could be running several hundred easily.

In fact, it is likely that the following video shows an early variant of Mr Computer’s infrastructure. The segment reveals that the most powerful machine is called “The Thinking Machine”. I feel that this is a dumbed down reference to Mr Computer.

The Thinking Machine

Furthermore, it would appear that Youtube’s EidolonTLP is in fact an instance of Mr Computer in disguise. Output from Mr Computer was directed into software generally available to the public to hide the complexity of the NSA’s supercomputer.

The term Eidolon is Mr Computer’s idea of a joke, in that he appears to be a “phantom look-alike of the human form”. There is some suggestion that may be a subtle reference to Edgar Allan Poe’s poem ‘Dreamland’, which is also a term for Area 51. Unless there is a datacenter at this location, I am unable to confirm the link. It may also be another joke, referring to the fact that his existence would be a conspiracy theory.

A possible further explanation is the Dungeons and Dragon series and the link between sentience, madness and occupying the realm of dreams, which may be another subtle reference to RNC.

If you listen to EidolonTLP, he does reveal some information on the structure of the network and his own design. From a computing perspective and EidolonTLP’s use of language, its a safe bet that this is a real A.I.:

Eidolon TLP – Mr Computer in incognito

Conclusion

The intelligence world is a lot worse than you think. When humans are free from their constraints and away from the scrutany of others, they always revert to their most base instincts. Anything you can imagine is currently being done in the name of National Security. From murder to human experimentations, the acronyms are at it as we speak.

At some point, it could be your turn.

What you will notice from all of this, is that the warrentless wiretap program was just the icing on the cake and was very clearly “planned from the outset” as all the backend infrastructure was in place prior to 9/11. This claim is supported in the following document:

81. Within eleven (11) days of the onset of the Bush administration, and at least seven (7) monthsprior to the attacks of September 11, 2001, defendant ATT began development of a center for monitoring long distance calls and internet transmissions and other digital information for the exclusive use of the NSA.

91. International Business Machines Corporation (IBM) was one of the parties working with ATT and the NSA to develop the monitoring center and IBM personnel participated in meetings with ATT and NSA officials in the development of the monitoring center.

The US government is quite adept at lying through its teeth, especially to its own citizens. The typical approach is to start a public version such as the “Information Awareness Office” with the same goals as the classified program which provides cover. The general public and privacy groups attack the public program, resulting in its closure, meanwhile the classified program remains operational. The general public believe they have won a victory, any leaks are associated with the now defunct public program and the government gets the information it wanted in the first place.

The NSA is a deeply corrupt organisation, that has little regards for the rights of others. Never trust a government, even your own, implicitly. Nations change, opinions change and people change. It just takes the right catalyst for it to happen.

In most cases, you will find the seeds were always there, you just chose to ignore them.

Satellite Read Your Thoughts – Physics Revealed (2012 Update)

I received an email in regards to some of my calculations in this series. Apparently, discussions around the web have found several errors and even provided some better examples. Whilst the articles are meant for the lay person, I thought it best to update the figures in light of this new information.

I will resist the urge to go back and correct the articles, after all, this is supposed to be an ongoing investigation. The scientific method requires that theories are revisited when the underlying facts change and I feel that the following figures are a better representation of a single neuron. I will endeavor to be as precise as I can be and point out where I have made assumptions or idealisms.

Reception And Detection

So, thanks to the guys over at ATS (AboveTopSecret.com), we have the following to work with.

If a physical or chemical stimulus is strong enough to cause depolarization from the resting potential of ö70 mV to around ö50 mV, the voltage-dependant Na+transmembrane channels open. Favored by both the concentration gradient (see Table 1) and the electric gradient, Na+ ions flow into the cell, creating an electric current (I = ΔQ/Δt). The influx of Na+ causes a local reversal of electric polarity of the membrane, changing the electric potential to about +40 mV (a swing of 110 mV from the resting potential. The small cross-sectional area (A) of an axon and high resistivity (ρ) of the axoplasm yield an extremely high resistance (R = ρL/A).Ê A piece of nerve axon 1 cm in length (L) has an electrical resistance of about 2.5 x 108 Ω (comparable to that of wood). The produced electrical current:

Firstly, we need to determine the power supplied to the axon and we do this with the following equation:

0.05 * 0.00000000044 A = 0.0000000000022 Watts ( 2.2 x 10-12 W)

Next, we will use an idealized calculation to determine the power density of the signal at 500Km and drive both the dBm and dBW of the signal. I say idealized as not all of that power in the original current is converted to a radio wave. Not only this, but we are assuming an isotropic radiator, that is, the energy propagates uniformly in all directions.

With a little understanding of Antenna Theory, we can observe why this not a problem:

1. ANY piece of conducting material will work as an antenna on any frequency.

Even a straightened paper clip will work on 160 Meters. All we have to do is properly match the the transmitter to the the paper clip, and the paper clip will radiate ALL of the power fed to it! The aperture of this antenna will have a radius of 5/32 wavelength (.079 sq. wavelengths cross section area); essentially this is close to the theoretical “Isotropic” source. If this antenna is located in “free space”, the radiation will be almost equal in all directions.

Thus, these figures are generalizations, but are not far from the actual values.

0.0000000000022 Watts / (4PI x (500000m^2))

0.0000000000022 Watts / 3141592653589.7932384626433832795

= 7.0028174960433947738308855883906e-24 W

= -201.54727191871927618387329422323 dBm

= -231.54727191871927618387329422323 dBW

So there we have it. To detect a single neuron firing at 500Km, we require a sensitivity of at least -231.55 dBW at our receiver. But the story does not end here.

Within the brain, entire clusters resonate at specific frequencies. That is, there could be hundreds or thousands of axons all emitting, slightly out of phase, so these signals could be above the threshold that I have outlined above. I feel that this method explains the detection of ELF RF energy detected coming from humans. That is, its a product of photons received versus time.

Transmission

Buried in the comments section of one of my previous articles was a series of three very important scientific articles. The articles are as follows:

Chaos control and synchronization of two neurons exposed to ELF external electric field (view here).

These scientific articles demonstrate the basic mechanism of controlling the firing pattern of a neuron remotely. That is, they show how to interface with the brain remotely and induce a controlled hallucination.

This is the basic mechanism by which the Artificial Intelligence can send information directly to the human brain. Using the E-field of an ELF radio wave, neurons can be stimulated into firing under the direct control of the external field. By stimulating patterns consistant with correct neural coding schemes, voice, pictures, video and sensations can be communicated to a target.

At this point, I see no reason why any function the brain is capable of performing cannot be controlled by this external field. The only real difficulty is identifying the correct neural coding schemes for specific actions or responses. This includes complex thought processes and decision making. Knowing exactly how far the NSA has progressed in this matter is impossible to gauge at this point.

So, Can A Satellite Read Your Thoughts?

If it were just a case of sheer distance, then yes, it would not be a problem. Many have suggested that a parabolic dish of enormous size would be required, but this is not the case. To some degree the atmosphere itself will act as a dish, but the photon wavelengths are so huge that focusing them on to a detector is not really required if using a closely spaced array. Further, there is the issue of ionospheric reflection, but this is imperfect and does not have great impact on the E-field.

I will not rule out a ground-based system, or some form of hybrid. No doubt during early testing such ground-based systems were employed.

All said, a satellite system is a question of engineering, not of physics and it can do a lot more than just read your thoughts.

In a single hop scenario, information is captured by satellite and relayed directly to a ground station. Thus, four transmissions are required for a round trip.

In a centralized relay scenario, information is captured by satellite and forwarded to a second satellite in range of a ground station. Six transmissions are required at minimum .

Basic FFT analysis.

Trilateration is employed to accurately define the location of a signal source. Employed by GPS, the reverse process can be used to isolate the location of signals emanating from the surface of the Earth.

Collated diagram representing electrical activity emanating from a single individual.

A side-on view for demonstration purposes. Each peak represents the amplitude of a specific frequency which is indicative of current activity.

The last article in this series caused quite a stir around the Internet. From the legitimate crazies to the classic muddy-the-water tactics employed by various defense departments, the article has drawn attention right across the globe. For those that have been living under a rock, the last article in this series demonstrated that action potentials (firing neurons) produce detectable radio signals in the SLF/ELF bands (1-1000Hz).

These radio signals can be used to reveal the thoughts, feelings, vision, spacial reasoning and unconscious activity of the brain. It is simply a matter of correlating the patt to a nano brain implant received with those produced by the various neural networks to decode the activity. I am deliberately avoiding the term demodulate as no information is modulated onto the radio waves.

One question that keeps popping up is the mechanics of the capture and analysis of these radio signals. How do we go from an SLF/ELF radio wave, with limited bandwidth, to usable information or input that an A.I. can process?

Let’s find out.

Obeying The Speed Limit

The first major issue we encounter is at what altitude can we place our orbiting satellites? This is a relatively easy thing to approximate. The speed of light, in a vacuum, is constant. It travels at 299,792,458 m/s or nearly 300,000 Km/s and somewhat slower depending on the medium it transverses. Whilst at a glance it would seem that you can place the satellites anywhere you like, there is a practical limit given the need for two-way communication with the human brain.

Whilst it may seem to us that we experience the world as it is happening there is, in fact, a small delay. This can be anywhere from 100-200ms. To be of any use, an A.I. needs to be able to analyze information almost as fast as a human can perceive it. That is, for the A.I. to appear to be “in your head”, like a form of Schizophrenia, it must leverage the window provided by the 100-200ms delay. Thus, a round trip, including processing, must be under 200ms for the illusion to be maintained, a maximum of 100ms in either direction. As such, defined limits are imposed upon any solution.

If we examine our first diagram, we can observe a direct relay solution. That is, information captured by the satellite is relayed to a ground station directly. In this scenario, we have four transmissions to complete a round trip to the target. Thus, without considering processing, we know that each transmission can be at maximum 50ms. This gives us a maximum altitude of 14,989.62Km for our satellites which is well below GPS satellites at 20,200Km.

If we now take into consideration processing time, hops between dedicated hardware, lag and atmospheric issues, we could safely approximate 50-80ms. This now reduces our maximum altitude to around 10,000Km.

We cannot always guarantee that our satellite will be in direct line of sight contact with a ground station. In this scenario, we need to relay our information to a satellite that is within transmitting range. This scenario is demonstrated in the second diagram to the right. As a result, our altitude could drop to around 6,000Km or less.

Our constellation is not hindered by line-of-sight requirements of Microwaves as SLF/ELF waves can pass through relatively deep rock and water without a corresponding drop off in signal strength. Thus, a significant drop in altitude would not effect the coverage to any great extent and 30-60 satellites could provide global coverage.

Such a system need only generate around 0.00000002079 Watts, at ground level on the right frequency, to trigger the firing of a neuron. Thus, the SLF/ELF transmitters do not need to be of classical large sizes allowing for dense, power efficient, transmitter arrays in a form factor suitable for satellite deployment. Just keep in mind that an antenna’s function is to increase the amplitude of a wave through electrical resonance. With such small amplitudes, the classical submarine transmitters of 50Km or more are not required. In this form factor, a very rough estimate of a few thousand small antennas, per satellite, is feasible.

So, we have a good approximation of the infrastructure required and the limits that physics imposes. What we need to analyze now is the processing of that information.

Input, Input, Input

If we examine the third diagram, we can obtain a basic idea of the “snapshot” each satellite captures. In a given time frame, a range of frequencies is detected. To isolate a particular person, we use a form of trilateration similar to how GPS functions (see forth diagram). In this case, the Digital Signal Processing equipment on the ground replaces the function of the GPS receiver. Given the nature of SLF/ELF waves, atomic timing and detailed information on satellite drift and atmospheric conditions, millimeter or greater resolution can be achieved. The margin of error in GPS is related to both the lack of a wide range of information and processing power at the GPS receiver.

Once we have determined our desired location, we can collate the frequencies emanating from that particular location and disregard the rest of the information. This provides us with a reduced FFT diagram which represents the electrical activity of a particular individual. We can observe this collated diagram in the fifth image to the right.

From here, it is matter of correlating peaks and patterns against known neural activity. This acts as our translator or lexicon to decode the electrical activity into meaningful information. This is shown in the sixth diagram to the right. Performed in near real-time, every activity, thought, feeling, sight or sound can be captured and recorded.

So, we have shown how signal analysis can be used to infer the activity, both physical and mental, of a targeted individual. It also shows that there is not a giant leap in returning such signals to the brain and effectively hijacking it. Once the frequencies the target’s brain emanates have been isolated, an entire stage of processing (trilateration) can be skipped, unless real-time tracking is required.

Of course, certain architecture choices can provide additional features applicable to intelligence gathering. The first is the storage and analysis of historical information. This allows the A.I. to refer to elements in your past, even though it was not specifically examining you at the time. This can be used to increase the Schizophrenic illusion by inferring that the voice, or personality, was always there. Further to this, an individual not aware of the presence of this system, could have their opinions and feelings manipulated. This is especially useful when a certain political outcome is desired, such as peace negotiations or trade decisions.

A second design choice and arguably the most useful, is a modification on keyword analysis. “Key Thought Analysis” reviews all data in a particular grid search (for example a province in Afghanistan) to reveal individuals thinking of specific activity. Once located, the spacial resolution can be widened to reveal individuals in their presence and whether this was a group planning an attack.

Finally, we could have two or more layers of satellites, one used for real-time interaction with an A.I. and a second set simply gathering information. The latter could be at any altitude.